16 research outputs found

    Automatic Intruder Combat System: A way to Smart Border Surveillance

    Get PDF
    Security and safeguard of international borders have always been a dominant issue for every nation. A large part of a nationā€™s budget is provided to its defense system. Besides wars, illegal intrusion in terms of terrorism is a critical matter that causes severe harm to nationā€™s property. In Indiaā€™s perspective, border patrolling by Border Security Forces (BSF) has already been practiced from a long time for surveillance. The patrolling parties are equipped with high-end surveillance equipments but yet an alternative to the ply of huge manpower and that too in harsh environmental conditions hasnā€™t been in existence. An automatic mechanism for smart surveillance and combat is proposed in this paper as a solution to theĀ above-discussed problems. Smart surveillance requires automatic intrusion detection in the surveillance video, which is achieved by using optical flow information as motion features for intruder/human in the scene. The use of optical flow in the proposed smart surveillance makes it robust and more accurate. Use of a simple horizontal feature for fence detection makes system simple and faster to work in real-time. System is also designed to respond against the activities of intruders, of which auto combat is one kind of response

    An Efficient Web Service Discovery Architecture for Static and Mobile Environments

    Get PDF
    The widely adopted and implemented core web servicesstandards SOAP and WSDL have achieved extraordinaryinteroperability across highly disparate software systems. The serviceoriented architecture SOA has become widely recognized for itsimportant role in information technology (IT) projects. A SOA is a styleof design that guides an organization during all aspects of creating andusing business services (including conception, modeling, design,development, deployment and management). SOA has been the idealcombination of architecture and technology for consistently deliveringrobust, reusable services that support todayā€™s business needs and that canbe easily adapted to satisfy changing business requirements. As systemsbecome more complex, the overall system structure-or architecture---becomes a central design problem. A system's architecture provides amodel of the system that suppresses implementation detail.Unfortunately, current representations of SOA architecture are informaland ad hoc. Currently many state of the art formal methods have beenapplied into the modeling, interoperability, dependability andtrustworthiness of web services and this could have a significant impacton the ongoing standardization efforts for services and cloudtechnologies. This paper presents a formal verification of proposed x-SOA based architecture for UDDI based web service discoveryframework. The paper attempts to establish the proposed architecture forlocating services in mobile computing environment as well. Potentially,extending the state of art formal method techniques could have asignificant impact on the ongoing standardization efforts for web servicesand cloud technologies for both fixed and mobile networks

    An Intelligent Reconnaissance Framework for Homeland Security

    Get PDF
    The cross border terrorism and internal terrorist attacks are critical issues for any country to deal with. In India, such types of incidents that breach homeland security are increasing now a day. Tracking and combating such incidents depends only on the radio communications and manual operations of security agencies. These security agencies face various challenges to get the real-time location of the targeted vehicles, their direction of fleeing, etc. This paper proposes a novel application for automatic tracking of suspicious vehicles in real-time. The proposed application tracks the vehicle based on their registration number, type, colour and RFID tag. The proposed approach for vehicle recognition based on image processing achieves 92.45 per cent accuracy. The RFID-based vehicle identification technique achieves 100 per cent accuracy. This paper also proposes an approach for vehicle classification. The average classification accuracy obtained by the proposed approach is 93.3 per cent. An integrated framework for tracking of any vehicle at the request of security agencies is also proposed. Security agencies can track any vehicles in a specific time period by using the user interface of the application

    A dynamic file replication based on CPU load and consistency mechanism in a trusted distributed environment

    Get PDF
    PokuÅ”alo se predložiti dinamički, kooperativni, pouzdani i sigurni pristup replikaciji datoteke utemeljen na opterećenosti CPU uz konzistenciju među replikama datoteke za distribuirano okruženje. Rezultati simulacije koja se sastoji od 100 potrebnih čvorova, tri servera datoteke i datoteke veličine od 677 KB to 11 MB pokazuju da kada se uzme u obzir opterećenje CPU, prosječno smanjenje vremena potrebnog za popunjavanje datoteke je oko 22,04 Ć· 24,81 %. Tako se optimiziralo opterećenje CPU i smanjilo traženo vrijeme popunjavanja datoteke. Opterećenje CPU smanjuje se za 4,25 Ć· 5,58 %. Rezultati pokazuju da se prosječno kaÅ”njenje upisa (write latency) s predloženim mehanizmom smanjuje za 6,12 % u usporedbi sa Spinnakerovim, a prosječno vrijeme čekanja čitanja (read latency) je 3 puta bolje od Cassandra Quorum Read (CQR). Predložena parcijalna propagacija ažuriranja za održavanje konzistencije datoteke povećava se do 69,67 % u odnosu na vrijeme potrebno za ažuriranje zastarjelih replika. Tako je integritet datoteka i ponaÅ”anje zahtijevanih čvorova i servera datoteke zagarantirano za čak manje vremena. Konačno, kroz algebra postupak uspostavljen je odnos između formalnih aspekata jednostavnog modela sigurnosti i sigurnog pouzdanog modela replikacije datoteke zasnovanog na sigurnom pouzdanom opterećenju datoteke.An effort has been made to propose a CPU load based dynamic, cooperative, trust based, and secure file replication approach based along with consistency among file replicas for distributed environment. Simulation results consisting of 100 requesting nodes, three file servers and file size ranging from 677 KB to 11 MB establishes that, when the CPU load is taken into consideration, the average decrease in file request completion time is about 22,04 Ć· 24,81 % thus optimizing the CPU load and minimizing the file request completion time. The CPU load decreases by 4,25 Ć· 5,58 %. Results show that, the average write latency with proposed mechanism decreases by 6,12 % as compared to Spinnaker writes and the average read latency is 3 times better than Cassandra Quorum Read (CQR). The proposed partial update propagation for maintaining file consistency stands to gain up to 69,67 % in terms of time required to update stale replicas. Thus the integrity of files and behaviour of the requesting nodes and file servers is guaranteed within even lesser time. Finally, a relationship between the formal aspects of simple security model and secure reliable CPU load based file replication model is established through process algebra

    Blinded by Simplicity: Locating the Social Dimension in Software Development Process Literature

    Get PDF
    The software development process is a complex human, intellectual and labor-intensive activity and human related factors have shown to be the most significant contributors to software system failures. Lacking the ability to identify or quantify these factors, software practitioners will not learn from the failures caused by them. Although, social factors give rise to high failure rates in software development projects they tend to be ignored. Business continues as usual. The inability for software engineers to attain a holistic and inclusive approach will leave the social dimension out and undermine the realization of a fully sustainable software development process.This paper builds on the masterā€™s thesis with the same title completed in December 2019 at Stockholm University. The thesis demonstrates how research literature on software development processes addresses (or not) the social dimension of sustainability from a holistic point of view. The results indicate that the practice of dealing holistically with complexity including the social dimension is still underdeveloped. Further research is suggested regarding the development of adequate supporting tools, social skills, and managerial attitudes and behaviors

    Framework for privacy preserving credential issuance and verification system using soulbound token

    No full text
    This paper proposes a framework for privacy-preserving credential issuance and verification over the public blockchain. The credential used in this framework is a soulbound token (SBT), a non-transferrable non-fungible token (NFT) verifiable on the blockchain. Once the issuing organization issues the credential, this framework gives the holder complete control of the credential. This privacy-preserving property allows the holder to selectively disclose the credential attributes in the verification process. The framework proposed suggests a decentralized credential recovery mechanism if the credential holder loses their private key. This paper compares this frameworkā€™s efficiency with different schemes based on privacy-preserving, selective disclosure, and decentralized credential recovery. This paper also compares the overhead for credential issuance and verification with Merkle trees. This paper also discusses the real-world use cases where this framework can be applied

    Cognitive Complexity Metrics and its Impact on Software Reliability Based on Cognitive Software Development Model

    No full text
    Abstract Software metrics provide a quantitative basis for the development and validation of models of software development process. Information gained from metrics is used in managing the development process in order to improve the reliability and quality of software product. The software metric is used to estimate various parameters of software development lifecycle such as cost, schedule productivity, quality and reliability. In this paper, an attempt has been made to frame the cognitive complexity metrics that will aid in increasing the reliability of software product being developed during the development lifecycle

    Software test effort estimation

    No full text

    Improved cognitive information complexity measure

    No full text
    corecore